G08B29/04

Dynamic partition of a security system
11626010 · 2023-04-11 · ·

A method for dynamically partitioning a security system is described. A security system identifies sensors registered with the security system. The security system then identifies a first partition attribute of a first group of sensors of the sensors. The first partition attribute indicates a primary partition of the security system. The security system then identifies a second partition attribute of a second group of sensors of the sensors. The second partition attribute indicates a secondary partition of the security system. The security system forms a dynamic partition of the security system based on a combination of the first and second partition attributes.

Dynamic partition of a security system
11626010 · 2023-04-11 · ·

A method for dynamically partitioning a security system is described. A security system identifies sensors registered with the security system. The security system then identifies a first partition attribute of a first group of sensors of the sensors. The first partition attribute indicates a primary partition of the security system. The security system then identifies a second partition attribute of a second group of sensors of the sensors. The second partition attribute indicates a secondary partition of the security system. The security system forms a dynamic partition of the security system based on a combination of the first and second partition attributes.

Information terminal and information processing device
11621797 · 2023-04-04 · ·

The present technology relates to an information terminal, an information processing device, and a program that make it possible to find out that an installation status has changed. The information terminal transmits information at predetermined time intervals. The information terminal causes information that is to be transmitted in a normal state of installation to be transmitted in a case where, after a return from a sleep state, a flag indicating whether or not an abnormal state of the installation has been detected indicates that the abnormal state has not been detected, and causes information different from the information that is to be transmitted in the normal state to be transmitted in a case where, after the return from the sleep state, the flag indicates that the abnormal state has been detected. The present technology can be applied to a home communication system.

MONITORING SYSTEM
20230146176 · 2023-05-11 ·

A monitoring system and method may receive detection times at which passage of one or more vehicle systems by a detection device disposed along a route is detected. Locations of the one or more vehicle systems at different times may be received from one or more location sensors disposed onboard the one or more vehicle systems. The locations of the one or more vehicle systems when the one or more vehicle systems were detected by the detection device may be determined by comparing the detection times with the different times associated with the locations. A condition or state of the detection device can be determined by comparing the locations that are determined by the controller with a device location of the detection device.

Energetic firing device boosting system voltage as required for energetic initiation

Energetic firing device using a boost circuit to ensure an energetic fire circuit is charged to an All-Fire voltage even if a power source is not capable of providing necessary voltage. Boost circuit may be located between power source and energetic fire circuit and increase voltage provided by the power source when enabled. Boost circuit may be located between system logic and the energetic fire circuit and generate the All-Fire voltage when enabled. The boost circuit may generate the All-Fire voltage from an enable signal and a pulse train provided by the system logic. The boost circuit may be a switching power supply that may regulate the All-Fire voltage generated. The boost circuit may be a capacitive voltage multiplier. The boost circuit may remove power from being provided to the energetic fire circuit until enabled thus reducing system power and increasing safety.

System and method for alarm signaling during alarm system destruction

A system and method provide for the immediate transmission of a potential alarm to a remote alarm signal escrow site and from the escrow site to a host station in the event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.” A system and method may also send an alarm signal during such an attack by using predictive analysis of real-time events.

Method and apparatus for evaluation of temperature sensors

A service management system facilitates service on building management systems. A connected services system of a connected services system stores temperature information from temperature detectors of building management systems (including heat detectors of fire alarm systems and thermostats of building automation systems), which send sensor values to control panels, which, in turn, send the temperature information to the connected services system. A temperature detector evaluation module of the connected services system retrieves the temperature information from the connected services database, generates aggregate temperature information based on the temperature information and then determines which of the temperature detectors require service based on the aggregate temperature information, for example, by detecting outlier temperature information. Scheduled service tasks for the temperature detectors requiring service are then pushed to a service workflow module, which sends the scheduled service tasks to a mobile computing device operated by a technician performing the service.

Method and apparatus for evaluation of temperature sensors

A service management system facilitates service on building management systems. A connected services system of a connected services system stores temperature information from temperature detectors of building management systems (including heat detectors of fire alarm systems and thermostats of building automation systems), which send sensor values to control panels, which, in turn, send the temperature information to the connected services system. A temperature detector evaluation module of the connected services system retrieves the temperature information from the connected services database, generates aggregate temperature information based on the temperature information and then determines which of the temperature detectors require service based on the aggregate temperature information, for example, by detecting outlier temperature information. Scheduled service tasks for the temperature detectors requiring service are then pushed to a service workflow module, which sends the scheduled service tasks to a mobile computing device operated by a technician performing the service.

Cable alarm tag

The present invention provides an improved cable that includes at least one insulated conductor insulated from and within and inside a insulated second conductor, with both conductors connected with both ends with a cable alarm tag to form a closed electrical circuit, with the loop of the cable connected to an article for securing the article. With the cable of the present invention, if severed, the use of jumper cables will maintain the electrical circuit loop closed for the outer conductor only, but not the insulated inner conductor that is within and inside the outer conductor. Therefore, when severing the cable to disconnect and discontinue the physical loop to remove the secured article, even if cable jumpers are used, the insulated inner conductor will remain open circuited when the cable is cut, resulting in trigger of the alarm.

Predicting Service for Intrusion and Alarm Systems Based on Signal Activity Patterns

A work order prediction system is described. The work order prediction system analyzes retrieved sensor signal activity records to compare counts of signal activity in defined signal groupings to corresponding predetermined thresholds of sensor signal activity and generates a report based on the comparison when sensor signal activity exceeds the determined threshold values. The predetermined thresholds of sensor signal are determined for each signal grouping by comparing corresponding groupings of service record activity against determined counts of historical sensor signal activity to establish threshold values for each of the groupings and produce a model based on the comparison of the historical sensor signal activity to service activity.